Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.
Think VPN makes for secure data access and transfer? Think again.
Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.
Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.
Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.
An introduction to the security requirements you should expect from a cloud service provider.
Silly or not, the Morto worm has caused a good bit of mischief.
Millions rely on traditional one-time password tokens. Here’s why your organization may want to replace or augment this approach for perimeter security.
Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.
Malware-makers have a powerful new tool: a spam bot that infects both PC and Mac platforms -- with support for Linux and iPad operating systems in the works.
Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?
The other shoe finally dropped in the case of the SecurID data breach at RSA. Could the fallout have been avoided?
Getting and staying connected was key to this Swiss insurance company, but Wi-Fi access meant it had to find a VPN solution.
Although the frequency of security vulnerabilities continues to decline, vendors were still preoccupied with patching last year.
What is IAM and how can you make an IAM project a success?
Getting a handle on UNIX vulnerabilities is no easy task.
Why does IT pass the buck to other internal groups when it comes to safeguarding enterprise security?
These tips can help you minimize mobile threats.
Who said hardware authentication tokens are infallible? CA's new program contrasts the advantages of its software-based approach with RSA Security's hardware-based SecurID model.
A new survey shows a disconnect between the security-first mentalities of auditors and the compliance-driven concerns of their employers.